Skip to content

halil-durmaz/Cyber_threat_engine_Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Analysis of the Cyber Threat Engines

📗 Contents

  1. Parsing the data
  2. Top 10 engines
  3. Similarities of the engines
  4. The reason why these FQDNs are malicious


🍎 Some domain knowledge

  • Phishing websites ---> Almost identical to the original
  • Malware websites ---> Install malicious softwares

Screenshot_4